Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
An Implementation and Evaluation of a Pairing on Elliptic Curves with Embedding Degree 14
Submitted by aekwall on Mon, 03/22/2021 - 12:15pm
exponentiation
pseudo7-sparse algorithm
pairing-based cryptography
multiplication algorithm bases
multiple devices
generation cryptography
Finite filed arithmetic
efficient curves
computer architecture technology
advanced cryptography
Approximation algorithms
Scalability
elliptic curve
Elliptic curves
Elliptic curve cryptography
public key cryptography
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
encryption
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 11:11am
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Hyper Secure Cognitive Radio Communications in an Internet of Space Things Network Based on the BB84 Protocol
Submitted by aekwall on Mon, 03/15/2021 - 11:03am
Internet of space things
Tungsten
telecommunication security
Task Analysis
Space vehicles
Space Things network
Satellite broadcasting
Resiliency
quantum cryptography
pubcrawl
Protocols
probability
BB84
internet
hyper secure Cognitive Radio communications
geocentric orbital satellites
Cryptographic Protocols
constant thread
collaborative manner
Cognitive Radio Security
cognitive radio
Bennet-Brassard
BB84 protocol
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Augmented Randomness for Secure Key Agreement using Physiological Signals
Submitted by grigby1 on Tue, 03/09/2021 - 2:03pm
Scalability
Metrics
physiological signals
physiology
predecessor SKA-PS protocol
Protocols
pubcrawl
quantisation (signal)
resilience
Resiliency
medical signal processing
secure cryptographic key generation
secure key agreement
security
set reconciliation mechanism
SKA-PSAR system
telecommunication security
wearable biosensors
Wireless communication
cryptographic key generation
Augmented Randomness
BANs
Bio-cryptography
BIOS
biosensors
body area networks
Communication system security
correct key generation rate
random key generation
Cryptographic Protocols
Cryptography
false key generation rate
generated keys
highly random cryptographic keys
Human behavior
key agreement
lightweight security mechanisms
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 1:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 1:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
Treats based Revisiting Defences Against Password Guessing Attacks and Phishing Data Over Different Online Records
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
Phishing of data
Human Factors
individual data
internet
Internet clients
logins attempts
message authentication
password guessing attack
password guessing attacks resistance protocol
phishing data
Human behavior
policy-based governance
problematic endeavour
pubcrawl
real page
revisiting defences
site page
standardized savings number
uncovering delicate data
word reference ambushes
Denial of Service (DoS).
authorisation
Brute force
brute force attacks
charge card number
client-server systems
Computer crime
computer network security
cookies-based solution
Cryptographic Protocols
accommodating login
dependable page
different online records
directly wide spread
failed attempts
failed login attempt
failed login tries
full-scale number
genuine customers
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »